Flock Safety Bravo Edge AI Compute Device BRAVO_00.00_local_20241017 accepts the default Thundercomm TurboX 6490 Firehose loader in EDL/QDL mode. This enables attackers with physical access to flash arbitrary firmware, dump partitions, and bypass bootloader and OS security controls.
References
| Link | Resource |
|---|---|
| https://gainsec.com/2025/09/19/root-from-the-coop-device-3-root-shell-on-flock-safetys-bravo-compute-box/ | Exploit Third Party Advisory |
| https://gainsec.com/wp-content/uploads/2025/09/Root-from-the-Coop-Device-3_-Root-Shell-on-Flock-Safetys-Bravo-Compute-Box-GainSec.pdf | Exploit Third Party Advisory |
| https://www.flocksafety.com/products | Product |
| https://www.flocksafety.com/products/license-plate-readers | Product |
Configurations
History
No history.
Information
Published : 2025-09-25 21:15
Updated : 2025-10-23 18:07
NVD link : CVE-2025-59402
Mitre link : CVE-2025-59402
CVE.ORG link : CVE-2025-59402
JSON object : View
Products Affected
flocksafety
- bravo_compute_box_firmware
CWE
CWE-616
Incomplete Identification of Uploaded File Variables (PHP)
